Qualys Threat And Vulnerability Management Cyber Security Advisor - Texas

Qualys Threat and Vulnerability Management Cyber Security Advisor - Texas

Location:
Plano - Collin County, Texas, United States
Salary:
Competitive
Type:
Permanent
Main Industry:
Search Management & Executive Jobs
Other Industries & Skills: 
Information Technology
Advertiser:
NTT DATA Services
Job ID:
132194574
Company: 
NTT DATA Services
Posted On: 
20 August 2025
Req ID: 
#

NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now.

We are currently seeking a Qualys Threat and Vulnerability Management Cyber Security Advisor - Texas to join our team in plano, Texas (US-TX), United States (US).

Role Responsibilities:

style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-This position is a part of the Vulnerability Management service acting as the primary support to the lead for the Vulnerability Management team and own identifying, quantifying, and managing cyber vulnerabilities across Organization, in conjunction with other parts of the supportive teams
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-The role will be responsible for assessing the security vulnerabilities & threats identified by the infrastructure scan. This person should work with appropriate teams across the businesses and associated 3rd parties to ensure appropriate remediation plans are defined and implemented
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Hands-on experience working with Vulnerability assessment tools like Qualys, Nexpose, Nessus & vulnerability response (ServiceNow), Splunk
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Perform information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Perform compliance scanning to analyze configurations and facilitate implementation of configurations and hardening settings for networks, operating systems, applications, databases, and other information system components
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Maintaining appropriate documentation that defines the Threat & Vulnerability Management Program, Policy and Procedures
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Participated in the calls to resolve information security incidents, including internal events and targeted threats
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Research, evaluate, and assess emerging cyber security threats, incidents, and vulnerabilities
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Work with the stakeholders to develop and maintain a vulnerability intelligence process that monitors for emerging systems vulnerabilities
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Prioritize the remediation of vulnerabilities based on their characteristics, such as threat intelligence, business criticality, and exploit maturity
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Define minimum standards in relation to threat management and monitoring compliance across the businesses
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Take responsibility for scheduling, detecting, and analyzing vulnerabilities and vulnerability-related activity affecting the organization domain
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Help create prioritized overviews of cyber vulnerabilities by putting them in the context of IT services and business applications, leading to remediation actions by the respective parties
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Conduct deep-dive analysis on attacks and share actionable data with partner teams
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Ensure the accurate and timely release of vulnerability metrics
style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Report on areas of non-compliance against Policy and/or Group Standards

Qualifications:

style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Must have 5+ years Security-Threat and Vulnerability-Vulnerability Remediation to include Researching, evaluating, scanning, reporting out on cyber security threats, incidents, and vulnerabilities (automated asset discovery, vulnerability management, threat prioritization, and remediation)
-Must have Hands-on experience working with Vulnerability assessment tool, Qualys VMDR.
-Must have client-facing experience
-Must be a US Citizen or a US Permanent Resident/Greencard Holder 
 

Highly Preferred Skills:

style="margin-top:0.0in;margin-bottom:0.0in" type="disc"-
-Prisma Cloud experience is an advantage to have
-These other Vulnerability tools is highly ideal: Nexpose, Nessus,  vulnerability response (ServiceNow), and/or Splunk
-Strategic thinker with attention to technical detail
-Strong communication and leadership skills
-Collaborative mindset with a focus on enablement and mentorship
About NTT DATA

NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us at us.nttdata

Whenever possible, we hire locally to NTT DATA offices or client sites. This ensures we can provide timely and effective support tailored to each client’s needs. While many positions offer remote or hybrid work options, these arrangements are subject to change based on client requirements. For employees near an NTT DATA office or client site, in-office attendance may be required for meetings or events, depending on business needs. At NTT DATA, we are committed to staying flexible and meeting the evolving needs of both our clients and employees. NTT DATA recruiters will never ask for payment or banking information and will only use nttdata and talent.nttdataservices email addresses. If you are requested to provide payment or disclose banking information, please submit a Apply form,
us.nttdata/en/contact-us.

NTT DATA endeavors to make us.nttdata accessible to any and all users. If you would like to Apply regarding the accessibility of our website or need assistance completing the application process, please Apply at us.nttdata/en/contact-us. 

This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here. If you'd like more information on your EEO rights under the law, please click here. For Pay Transparency information, please click here.

Apply:

Never supply bank or financial information to advertisers. If bank details or money are requested for a job vacancy, email support@tiptopjob.com.

People who were interested in this job also applied for these similar roles..

Qualys Threat And Vulnerability Management Cyber Security Ad.. Plano, Collin County, Texas, USA
More jobs like these
© 2025 TipTopJob.com (B)
Facebook X - Formerly Twitter LinkedIn Instagram All Social Networks